Premium Essay

Project Execution

In:

Submitted By zozo790
Words 3824
Pages 16
Project Execution Process Group: Put Your Plan to Work
Your project plans are worth nothing without an impeccable project execution. This phase is necessary to make sure project deliverable s and project objectives will meet stakeholder expectations. Learn more about the processes defined in the Executing Process Group.
The PMBOK 5 categorizes project management processes into five groups. o Initiating Process Group o Planning Process Group o Executing Process Group o Monitoring and Controlling Process Group o Closing Process Group
These process groups interact with each other during the project life-cycle. During the Executing Process Group most of the budget is expended.
Definition of the Executing Process Group:
“The Executing Process Group consists of those processes performed to complete the work defined in the project management plan to satisfy the project specifications.” – A Guide to the Project Management Body of Knowledge (PMBOK Guide) Fifth Edition • To understand the activities involved in this process group, let’s get see the processes involved. The processes in the Executing Process Group are shown below.

Processes in the Executing Process Group

As you can see from the diagram above, there are a number of processes to follow in the Executing Process Group. These processes belong to several knowledge areas ranging from Project Integration Management to Project Human Resource Management to Project Stakeholder Management. This section provides a brief of each process in the Executing Process Group.
Direct and Manage Project Work
The Direct and Manage Project Work process belongs to the Project Integration Management knowledge area. Some outputs of this process are deliverables, work performance data, and change requests. Some activities in this process include managing risks, performing activities to

Similar Documents

Premium Essay

Cyber Crime

...People's Republic of Banglades: In Bangladesh, a draft Bill on Information and Communication Technology has been introduced in the Parliament. The final report on the Law on Information Technology was approved by the Office of the Law Commission in its meeting dated 08.09.2002. The Proposal: Chapter VII on Penalties and Adjudication and Chapter IX on Offences includes some cybercrime provisions that prohibits attacks or unauthorized access to computers and computer systems. Chapter IX: Section 66. Punishment for tampering with computer source documents Whoever intentionally or knowingly conceals, destroys or alters or intentionally or knowingly causes any other person to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by any law for the time being in force, shall be punishable with imprisonment of either description for a term which may extend to three years, or with fine which may extend to Taka two lakhs, or with both. Explanation.- For the purpose of this section, “computer source code” means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form. Section 67. Hacking with computer system - Whoever, with the intent to cause or knowing that he is likely to cause wrongful loss or damages to the public or any other person, does any act and thereby destroys...

Words: 2608 - Pages: 11

Free Essay

Development and Validation of Computer Assisted Instruction

...Review of related literature and studies Literature * Kim (2006) how visual learning can affect the students way of learning. * Smith (2002) visual learners prefer to see how to do things rather than just talking about it. * Lehman, newby, russel, stepic (2005) computer-based tutorials have advantages such as students can interact with embedded questions then easily give feedbacks. * Laird (1985) by stimulating the senses, especially the visual sense, learning can be enhanced. * Computer assisted instruction – is an integrated module for the development and evaluation of the learning scheme of the users on the material provided. * * computer-assisted instruction (CAI), a program of instructional material presented by means of a computer or computer systems. The use of computers in education started in the 1960s. With the advent of convenient microcomputers in the 1970s, computer use in schools has become widespread from primary education through the university level and even in some preschool programs. Instructional computers are basically used in one of two ways: either they provide a straightforward presentation of data or they fill a tutorial role in which the student is tested on comprehension. If the computer has a tutorial program, the student is asked a question by the computer; the student types in an answer and then gets an immediate response to the answer. If the answer is correct, the student is routed to more challenging problems; if the...

Words: 394 - Pages: 2

Premium Essay

How to Enter a Product

...How to Enter a Product – Once Upon A Child Megan Sturgeon American InterContinental University Abstract This paper is going to discuss how to enter a product into a computer system. Once Upon A Child is a store that purchases gently used children’s items. This paper is going to go step by step on how to put an item into the system to price it for the store. It is also going to describe how this item goes into the store system and the previous owner of the item receives money for selling it to the store. How to Enter a Product – Once Upon A Child Once Upon A Child is a franchise much like Plato’s Closet that resells gently used items. It is important to note that these specific companies are resale not retail. When a customer is ready to let go of their gently used children’s clothing, toys, equipment, and accessories they can bring them in to their local Once Upon A Child and receive cash on the spot. There is a process when the customer brings these items in that let each franchise price their merchandise for the same amount. Almost all of the process is done on a computer program already installed on the computer. There are a few exceptions that are not already listed and involve a bit of research. First, an employee of Once Upon A Child would gather all of the customer’s information and items. There is a sign-in sheet that the customer would fill out with their name, address, phone number, email and signature. The employee also has their own sign-in log where they...

Words: 852 - Pages: 4

Premium Essay

Critical Response Essay

...Critical Response Essay Life is full decisions, some harder than others, but those hard decisions have to be made sometimes for the wellbeing of others. Medical technology is beginning to take of the medical field and is making ethical decisions and issues a thing of the past. Due to this there are has been some debate on whether or not the technology in the medical field is harming the medical profession or not. Some people agree with the topic others do not and think that the medical team should be the ones making the decisions not the computers. The passage, Medical Technology and Ethical Issues by William E. Thompson and Joseph V. Hickey, explains the dilemma of technology in the medical field, and the different sides of it. The technology that is being referred to is the RIP computer. This is a computer program that doctors us to help make decisions about whether to administer lifesaving actions to patients that are dying or to let them die. In the passage critics and supporters take opposing sides to the issue of technology being used in the medical field. Some believe computers will be making the decisions, while others believe it just provides data to make decisions on who to treat. On the debate of the use of the RIP in medical field has two main positions, the critics and the supporters. The critics disagree with the technology because, they say that it is a “frightening example” of the overreliance of computer technology that makes decisions that should be...

Words: 796 - Pages: 4

Free Essay

Opportunity Analysis & Execution Project

...Opportunity Analysis & Execution Project Concept Sync Doctor is the next generation of interactive Personal Health Records (PHR). At the present time, PHRs serve as an electronic repository of the personal health data of patients. Many PHRs are dependent on patient entry of data meaning that they are fraught with inaccuracies and are composed of a colorful blend of layman’s terms and inappropriate uses of medical terminology. Sending this compilation of patient data to a physician’s office is helpful, but is heavily reliant on the trained medical professional to extract the key facts from fiction and translate it into the physician medical record in a concise format utilizing correct medical terminology. This is both time-consuming and potentially dangerous as the translated medical history is hardly free from errors. The dawning era of virtually all medical records in the United States being digitized by 2014 into Electronic Medical Records (EMRs) through government mandate has presented an opportunity to take PHRs to the next level. Sync Doctor would allow key patient medical information to be extracted from the physician EMR and imported to the PHR where it can be stored, updated, and shared with anyone involved in the care of an individual patient as authorized by the patient. This is a patient centric platform that facilitates the collection and transfer of reliable protected health information (PHI) and eases the burden of time spent filling out forms and re-entering...

Words: 806 - Pages: 4

Premium Essay

Death Penalty

...Final Project Name: Zeeshan mushtaq Roll number: 18-10638 Should Death Penalty Is Compulsory For The People Who Kills Other People? Death penalty is a very contradictive topic and has received tremendous support to abolish it. Society considers death penalty to be very unethical and barbaric. Death penalty is basically a legal process in which the criminal is executed for committing serious crimes such as murder, rape or human trafficking. Death penalty is the most debatable issue in the world. There are also some people who think that death penalty should be legalized in order to provide justice to the people. However I personally disagree that death penalty can put to end to a crime, nor can it help promote social security; but instead it is just a form of inhumane act which is immortal and it promotes violence and risks the innocent lives. The proponents of this argument believe that death penalty is morally right and fair because when one life is taken, one life must be paid in return. This is a complete mistake in mortality. The fact is that every form of killing, even through death penalty, is obviously wrong because it does not make us moral by killing a killer. The question most people ask is that if the first killing is wrong then why do we allow the second killing? The former U.S president Jimmy Carter also stated that the process of death penalty is broken and cannot be repaired and now it should be the time to seek a better way and more moral substitution...

Words: 1107 - Pages: 5

Premium Essay

Sos 360 Games People Play

...In the movie The Princess Bride, the outlaw Vizzini is challenged to a game of wits by Wesley. Vizzini is offered two goblets of wine and must determine which one holds the poison. This situation includes all the four elements of a game as described by Professor Stevens. The first element of a game is players. A game must have at least two players. In the movie The Princess Bride, Vizzini and Wesley are the players in the game. The second element of a game is common knowledge. Common knowledge is where every player has the same information and is aware that the other players have the same information. It was common knowledge to both Wesley and Vizzini that only Wesley knew which goblet had poison in it. It was also common knowledge that only one goblet could be chosen by Vizzini in that they would both drink their wine at the same time. The third element of the game is payoffs. The payoff of the game is the degree to which each player is satisfied with an outcome. The payoff for Vizzini and Wesley was very similar in that the opponent would be dead from drinking the poison and the winner would get the Princess. The fourth element of the game is strategy. Strategy is what decision would be made by the player in every situation the player finds himself in. When Vizzini found himself in this situation of choosing a cup and whether to be a clever man or a great fool, he decided to use a strategy that would create a diversion and switch the cups ensuring he alone knew which cup he...

Words: 838 - Pages: 4

Premium Essay

Burned Alive

...A Survivor Have you ever survived an incident so bad that could have been deadly? Souad, the author of Burned Alive, has experienced many difficulties throughout her life. Burned Alive is a memoir which she tells of the painful and cruel things that were done to her at a very young age. She claims to have lived in a small village near West Bank but doesn’t remember as much because she was held captive behind an iron door and was barely given any freedom as a girl. Being born as a girl was the most terrible thing during those times and it was considered to be a curse. They were given the impression to be worthless. Saddened by this, animals were better off than them. The truth is she was often beaten daily for the slightest things such as taking too long to make tea for her father or just for picking a green tomato by mistake because her hand was moving so rapidly due to the fact that she had to pick so many in the least amount of time. Her father often came thrashing at her mother for no real reason. Numerous amount of families practiced this type of behavior. At least twice or even three times she witnessed murder. Her mom would become pregnant and then later they were gone. There were certainly no babies to be seen. She had suffocated newly born babies with sheep skin. No one asked questions. It just happened and that was it. Her close relatives praise her by saying that they would have done the same. Her mother had fourteen children but only five were still living...

Words: 655 - Pages: 3

Free Essay

Tanglewood

...Tanglewood’s focus on reducing turnover makes sense for three key reasons: It is costly to us. It is affecting the performance of our organization. It may become increasingly difficult for us to manage as the availability of skilled employee’s decreases in the future. Tanglewood is struggling to come up with a generous plan to retain employees. Based off the responses given during the exit interviews, our company can come up with a way to produce a better retention plan. Immediate changes need to be taken with, but not limited to: • Implementing a better manager training program and not doing away with it • Brainstorming a creative plan to retain managers • Employee satisfaction survey should be done every six months instead of every year (given the high retention rate, otherwise I would stick with a yearly survey) • The four major topics within the survey should contain more than one or two questions in regards to each topic • Exit interview questions should be semi-structured We need to take the time to invest in our staff through career paths, opportunities, training and hiring which will save the company in the end by keeping the best employees. By having a positive work environment, where employees feel appreciated, our employees would feel encouraged to work harder, benefiting both themselves and the company. RED FLAGS Superior Alternatives: Better Salary elsewhere, Company Competitors, Additional benefits other than 401K Dissatisfaction with Organization...

Words: 564 - Pages: 3

Premium Essay

Does Technology Make USupid Research Paper

...One would question if technology plays a big role in our daily lives. There's a lot of talk going on about technology in schools. Does it make them more astute than others? Would a student use it the wrong way? Would technology affect their brains in a good or bad way? I do believe that the technology purchased will harm the students’ life. In fact, it might even sabotage their education, and they might learn less. Also, multitasking might cause interruptions of their schooling and bring them down whole grades. Is that improving the student? Undoubtedly, students are a unique population. They react to things differently. They also would react to using technology in a classroom individually from other kids. Some kids can stay of technology long enough to do their homework, or study for a test, while others cannot even stay one minute away from their electronic devices before getting irate. In the article,’ Does Tech Make Us Stupid?’, it says,” A recent study… suggests that 90 percent of us are suffering from digital amnesia.” This means that because of the internet, we no longer need to remember information because we have the internet to do it for us. So what if all the internet went out? We would not be able to learn and kids would feel useless because they would not know anything if they didn’t have a working device on them. They would not know how to deal with some aspects of life. Why? It's because they have no way to connect to the internet and search it up. They would...

Words: 905 - Pages: 4

Premium Essay

Deploying an Open Source Private Cloud Infrastructure:

... Abstract The purpose of this thesis is to demonstrate and show the technical and logical part of building an open source cloud. The process of doing this took two main different approaches in making it work. This thesis will explain and demonstrate the two ideas which were diskless booting distributing computing and Ubuntu Enterprise Cloud based on Eucalyptus. In order to understand the technologies used, a project on building the cloud was done at the premises of the Central Luzon State University – Information Systems Institute, Science City of Munoz. In this project, the installation and configuration were done on two Ubuntu servers and one client Ubuntu desktop computer in both approaches. As the project went on, challenges were encountered which caused the change to different ways of facing the aim and the objective of the project. Regarding the first approach of building a cloud computing environment, explanations on how the idea came about, how to use preboot execution environment, booting through the network and managing the cluster computers remotely from the servers are all included in this thesis. Drawbacks of this approach are also explained in this documentation. Regarding the second approach, Ubuntu Enterprise Cloud based on Eucalyptus was used as the preferred technology. This thesis will explain, demonstrate and show the process and the outcome of using this technology . Virtualization Technology and...

Words: 326 - Pages: 2

Premium Essay

Homework 7

...Homework 7 task 2 Chapter Exercises 1. Certain Ethernet adapters for ISA PC systems have limitations which can lead to serious network problems, particularly with NFS. This difficulty is not specific to FreeBSD, but FreeBSD systems are affected by it. 2. You must check if the directory you want to mount is actually exported on the NAS Gateway 500. To check what file systems, directories, or files are exported from NAS Gateway 500, use the showmount command. If NAS Gateway 500 doesn’t respond to the showmount command, you should check if the NFS server daemons are running at NAS Gateway 500. 3. By manually editing the NFS configuration file, and through the command line, i.e. through exportfs. 4. Read-write/ 192.16.0.0/var/ITT-Tech library 5. Refer to lab. 6. NFS attribute caching can cause inconsistencies when large numbers of client nodes are asked to access files that have been updated recently and the attribute caching data on the client has not expired. Disabling attribute caching eliminates the problem but may degrade performance for frequent file operations requiring file attribute data. 7. Mountfs 8. Diskless system - is a workstation or personal computer without disk drives, which employs network booting to load its operating system from a server. PXE boot - is an environment to boot computers using a network interface independently of data storage devices (like hard disks) or installed operating systems. Dataless system - Diskless and dataless clients are machines...

Words: 260 - Pages: 2

Premium Essay

Deployment

...[pic] [pic] Windows Deployment Services Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Trina Gorman Editor: Katie Cumming Abstract This guide provides an introduction to Windows Deployment Services in Windows Server® 2008. It includes an overview of features and procedures to follow to setup the technology. [pic] Copyright Information This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release, and is the confidential and proprietary information of Microsoft Corporation. It is disclosed pursuant to a non-disclosure agreement between the recipient and Microsoft. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights...

Words: 9354 - Pages: 38

Premium Essay

Server Buil Automation

...Installing Cobbler Introduction This post will show you step by step installation of Cobbler, please comment if you think anything’s is missing as you know nothing is perfect, so my blog  This topic focus on CentOS/RHEL/Fedora, if everything goes well here you should be able to build client servers without any manual work using PXE boot. Server setup. For the cobbler server basic requirement is you need two NIC cards if you want to use it for DHCP as well. Why do i need two NIC cards because it allow client servers to initially boot up in the private network where Cobbler will handle the installation. Since Cobbler utilizes DHCP and TFTP, making these services listen on a Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the...

Words: 16529 - Pages: 67

Free Essay

Nfs (Network File System)

...remote server. The client user is usually unaware on the storage location on the file they are using. NFS reduces the storage needs used on the client and aids in the administration work load. With an NFS the file system stored on a remote server and the directory is shared over a local network. The server has a large capacity disk drive and device so that copies for file can be backed up with a problem. Diskless systems boot from the file server and load the system from a fileserver. Because a diskless client doesn’t require much to run a file server system you can use older machine as clients. Other options for NFS for Linux are netboot and dataless system. Netboot uses TFTP (Trivial File Transfer Protocol) that runs PXE (Preboot Execution Environment) a boot server for Intel. Dataless systems allow the user to store all files remotely but only Linux based applications can be kept on the disk. IPtables are composed of two components netfilter and IPtables. Netfilter a set of tables that hold rules the kernel uses to control network packet filtering. IPtables set up, maintain, and displays the rules stored by netfilter. Rules use one more categories matches or classified with single action. The rule that applies to the network packet is matched using the categories and action is applied to packet. Rules are store in chains. Each rule in a chain is applied, in the order, to the packet until a match is found. In the kernel IPtables replaces the earlier Ipchains as a method...

Words: 387 - Pages: 2